
Secret Private Quiz

Quiz
•
Other
•
Professional Development
•
Medium
ASHLEY TRIVITT
Used 18+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When any entity assess compliance with the security requirements of NIST SP 800-171, they must use:
The NIST SP 800-171A procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-88 Revision 1 procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-53B procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-171 Revision 2 procedures to evaluate the effectiveness of the tested controls
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Certified Assessors will review information and evidence to independently verify that:
The contractor is aware of the objectives of the required practices
The contractor meets the stated assessment objectives for all the required practices
The contractor has implemented all the required controls
There is an action plan in place to implement all the required practices
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
PKI stands for:
Public Key Information
Public Key Infrastructure
Performance Key Indicator
Process Key Indicator
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The Property that preserves authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information is called:
Security
Privacy
Integrity
Confidentiality
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The application of an assessment procedure to a security requirement produces:
Assessment findings
All of these
Risk Mitigations
Remediation Plans
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Security functions include:
Employee vetting
Establishing System Accounts
Performance Review
Communication with regulators
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
To document implementation of NIST SP 800-171, the contractor must develop, document, and periodically update a system security plan that describes:
All of these
System environments of operation
How security requirements are implemented
System boundaries
Create a free account and access millions of resources
Similar Resources on Wayground
51 questions
AZ-900 Practice Test 3

Quiz
•
Professional Development
50 questions
teaching profession 50-100 review

Quiz
•
Professional Development
52 questions
2024 National Educational Technology Plan Quiz

Quiz
•
Professional Development
45 questions
Chapter 9 Review

Quiz
•
Professional Development
53 questions
Caregiving NCII

Quiz
•
Professional Development
53 questions
ASU Exam 3

Quiz
•
Professional Development
50 questions
Newton House Quiz Night

Quiz
•
Professional Development
47 questions
Ship Management and Maritime Logistics Quiz Set 3

Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade